Encoding and Decoding information with the help of Hill Cipher

Abstract

The role of cryptographic part in today‟s world is very significant. It not only secures information mathematically by mailing massage with a key but also provides confidentiality which is the most important factor in today‟s world. Hill cipher is also one of the most famous symmetric cryptosystem which can be used to protect information from unauthorized party. This paper gives us dimensions of new technique in Hill cipher, here we are developing the complex procedure of key generation for the process of encryption of message to avoid any kind of data loss. Hill cipher is a matrix based poly graphic substitution which is an additional factor to the user. A sender wants to transmit information to a receiver over an insecure channel that is a channel which may be tapped by any one. So, the information which is to be transferred, which we call the plaintext (actual message) which must be transformed (encrypt) to a cipher text, a form not legible by anybody other than the particular receiver. There must be given some way to decrypt the cipher text, i.e. get back the original message, while this must not be possible for receiver to read the information. This is where keys come into play; the receiver is considered to have a key at his disposal, let him to recover the actual message, a fact that distinguishes him from any data loss. This leads to the user for a secure account for user.

Authors and Affiliations

Ashish Vashisht

Keywords

Related Articles

Projective Change between Special (α , β) - Finsler Metric and Rander’s Metric

Finsler geometry is originated from Differential geometry. Finsler geometry is Riemannian metric without quadratic restriction. In Finsler space we see special metrics such as Randers metric, Kropina metric and Matsumoto...

Big Data Cluster Processing Through Optimized Speculative Execution

A big parallel processing job can be delayed substantially as long as one of its many tasks is being assigned to an unreliable or congested machine. To tackle this so-called straggler problem, most parallel processing fr...

Performance of Fixed Speed Wind Turbine Generating Systems in Power Flow Solutions

An increased penetration of wind turbine generating systems into power grid calls for proper modeling of the systems and incorporating the model into various computational tools used in power system operation and plannin...

Comparative Study of SiGe MOSFET with Single Substrate MOSFET Using Visual TCAD

A comparative study of SiGe based MOS transistor with single Si and Ge based MOS transistors has been investigated. The objective of this study is to analyze the performance of SiGe MOSFET which shows some significantly...

Introduction to Image Registration in Remote Sensing using Matlab

Image registration is used as a preliminary step in other image processing applications. It is difficult to find an accurate, robust, and automatic image registration method, and most existing image registration methods...

Download PDF file
  • EP ID EP245996
  • DOI -
  • Views 139
  • Downloads 0

How To Cite

Ashish Vashisht (2017). Encoding and Decoding information with the help of Hill Cipher. International journal of Emerging Trends in Science and Technology, 4(8), 5692-5696. https://europub.co.uk./articles/-A-245996